Year: 2016

Digital and Physical Security Consulting and Training

Has the Cyber Security Industry Failed

In an article on www.cnbc.com Aneri Pattani appears to be saying that the cyber security industry has failed.  Aneri refers to breach-after-breach and points to the fact that simple, old-school expoits & attack methods continue to work against newly deployed software.  While the facts are true, I believe that Aneri has missed the point completely.  I…
Read more

We’ve Moved to Stoughton

After nine years providing consulting and training services to customers in Massachusetts, Rhode Island, and New Hampshire, MEI Security has moved into a new location with our very own dedicated training room. Our new address is 630 Park St, Stoughton, MA  02072 Stay tuned for more information about our grand opening celebration.

That Cool Device on Your Wrist May Be Exposing Your PIN

We’ve known for years that things like webcams and microphones can be used to spy on us and steal our passwords.  Now that cool wearable device on your wrist can give attackers your PIN.  Basically the movements of your hand can be recorded by the device and sent to an attacker for analysis.  Looks like…
Read more

Source Boston 2016 Promotion

MEI Security wants to see YOU at the Source Boston conference, May 18 and 19. Join us where Security and Business come together at Source Boston 2016, and drink in the Security know-how. Each person who signs up with the affiliate code “AFFILIATE_VIKSOLEM” gets a portable USB battery, a slide-able webcam cover, and their choice of an MEI…
Read more

Two Cyber Security Secrets about the FBI v Apple Case

Speaking as a cyber security professional, there are two “secrets” about the FBI v Apple case that seem obvious but don’t appear to have much visibility in the news.  (1) If you want to break into an encrypted device you hire people who do that for a living not the manufacturer, and (2) if a…
Read more

How to Get Control of Your Accounts

As we continue to use services of different companies, we end up with more and more accounts.  Getting control of all of those accounts can be a very difficult task.  Here we mention one method and explain an second one in detail. Both will work, but each one has strengths and weaknesses. The list of…
Read more

Happy Birthday MEI Security

Mabuhay Enterprises Inc. was formed nine years ago, on February 10, 2007.  Since then we have continued to help our customers understand risk and secure their infrastructures.  What started as a small, part-time endeavor has grown to serve multiple customers, and is on a path to serve many more customers in 2016. In the coming…
Read more

Apple vs FBI – After They Break The Encryption

Let’s assume that Apple does help the government subvert the security of iPhones by getting them into this one device.  This is not Apple’s specialty.  I wouldn’t hire a safe builder to crack into a safe.  I’d hire a safe cracker, but that’s just more about how the government is being disingenuous when it says…
Read more

How to Answer Secret Questions

Many accounts permit or require users to answer so-called “secret questions”.  The idea is that you can provide answers to questions so that they can verify that it’s you answering the questions.  Unfortunately for most of these questions the answers are easily obtained by an attacker.  Here we discuss how to prevent those attacks so…
Read more

Apple vs FBI – Infosec Failure for San Bernadino

While much of the argument about the iPhone data centers on whether Apple should comply with an order to break their own protections, companies which own phones should note that the real failure is that of San Bernadino County’s information security policies and procedures.  They permitted their property ( the iPhone ) to be used…
Read more